Ransomware lies behind the ongoing outage of hosted Exchange services at Rackspace, the company disclosed in a Tuesday update. The company did not disclose any particular ransomware actor. It told federal regulators that the outage is likely to create a financial loss.
The 2019 seizure by U.S. law enforcement of online criminal marketplace xDedic is paying dividends for lawyers unrolling prosecutions of accused fraudsters who allegedly obtained compromised credentials from the site. The FBI and IRS estimate that xDedic facilitated more than $68 million in fraud.
Black Hat Europe returns to London, offering deep dives into the latest cybersecurity research and trends, including how to build an open, transparent, but also secure internet; harvesting zero-day flaws before attackers; what we can learn from "metaparasitical" scammers who scam scammers; and more.
Russian actors may be more willing this winter to use digital tools to coerce and influence Europe away from its support of Ukraine, computing giant Microsoft warns. The Kremlin has at its disposal ransomware and active digital disinformation operations.
Windows systems in Russia are being stalked by a new Trojan that purports to be ransomware but is really designed to wipe PCs and leave them unrecoverable, security researchers say. Dubbed CryWiper, it's one of a number of wipers - mostly targeting Ukraine - seen in the wild this year.
A French hospital in the Parisian suburbs scrambled to respond to a weekend cyber incident by transferring patients, directing emergency cases elsewhere and bringing on additional staffers to observe patients. The incident does not appear to have spread beyond the Hospital Center of Versailles.
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Medical providers are facing growing data security and privacy threats from their trusted partners - a wide array of business associates from medical records software firms to debt collection agencies. Learn why breaches are up 102% and what providers can do to defend against them.
From the invasion of Ukraine to the conviction of a former Uber CISO and the Musk takeover of Twitter, it's been a watershed year for cybersecurity concerns. Veteran CISO David Pollino reflects on 2022 and looks ahead to the challenges - and opportunities - that await in 2023.
Thousands of Rackspace customers continue to face hosted Microsoft Exchange Server outages after the managed services giant took the offering offline after being affected by an unspecified security incident Thursday. Rackspace urges affected customers to at least temporarily move to Microsoft 365.
New Zealand private health insurer Accuro says an investigation into a cyber incident at a third party IT infrastructure provider so far has not revealed evidence of a data breach affecting its 34,000 customers. Customers should expect delayed service in claims processing.
With the surge in ransomware and other major hacking incidents affecting third-party suppliers, it is more critical than ever for healthcare sector entities to diligently scrutinize threats and risks involving their vendors, says Denise Anderson, president and CEO of the Health-ISAC.
The U.S. federal government says the Cuba ransomware gang actively targets critical infrastructure and that its criminal efforts have netted it $60 million so far. The group has recently modified its techniques, says an alert from the FBI and the Cybersecurity and Infrastructure Security Agency.
Web3 companies are under attack by cybercriminals all year. After a compromise occurs, how should organizations respond? In Part 2 of this interview, Martin Derka of Web3 security firm Quantstamp discusses short-term and long-term mitigation steps and how to defend against cryptocurrency theft.
Federal government departments issue documents, store sensitive PII and disperse vast payments across multiple siloed environments that have inconsistent access requirements, which often make them insecure and a prime target for fraudsters and thieves. How can these departments secure access?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.